ITIL Fundamentals

Service Operations

Stage
4

This refers to the process of allowing access to authorized users and prevent access by non-authorized users. It works closely with Information Security Management.

Access Management Activites

  • Request Access - Typically comes from the service desk via a service request (in Service Operations) or from a request for change (in Service Transition).
  • Verification - Different levels of access may include different amounts of verification.
  • Providing Rights
  • Monitoring Identity Status
  • Logging and Tracking Access
  • Removing or Restricting Rights

Next Up

Service Operations Functions